Advert

SD Card

Last edited by . Total of no comments in the discussion.

A SD Card (Secure Digital Card) is an IC (Integrated Circuit) which is stored in a compact and rugged plastic enclosure. SD Cards are designed to store data and to enable the transfer of data between devices equipped with SD Card slots. Current SD Card capacities range up to 1GB. A SD Card is 32mm long, 24mm wide, and 2.1mm thick. An even more compact format, the miniSD Card, is 20mm long, 21.5mm wide, and 1.4mm thick. The theoretical transfer speed of a SD 1.0 Card is 12.5MB/s. SD 1.1 Read More

Share on:

Type Conversion – Class to Class

Last edited by . Total of no comments in the discussion.

Now that we have understood how to convert basic data types to class types and vice-versa, it is time to learn how to convert objects of one class type to another class type. The conversion between objects of different classes can be done using either a one-argument constructor or a conversion function. The choice depends upon whether the conversion routine has to be declared in the source class or in the destination class. To illustrate, consider a program that contains two classes: A and B. Also consider the statement: object_A Read More

Share on:

How to Rotate the Screen in Windows

Last edited by . Total of no comments in the discussion.

Rotating a monitor screen has several practical uses. Having a “portrait” screen orientation allows viewers to see entire documents at 100% size and view taller web pages without the need to scroll as much. Additionally, rotated screens take up less space on a desk, especially if they are widescreen monitors. Note: Some monitors are not designed to be rotated (such as CRT Monitors). Therefore, users should determine whether their monitor can safely rotate without damage. It is not recommended that users physically turn any monitor that is not designed to Read More

Share on:

How to Access a Router

Last edited by . Total of no comments in the discussion.

When setting up your router,  the most important thing you need to do is access the router. You do this because you need to set up the security features and type of Internet connection. Therefore, getting into the router is very important. Accessing the router is like accessing any other website. First, you need to know the router’s default IP address. For example, it might be: 192.168.0.1, 192.168.1.1, etc. If you don’t know what your router’s local IP address is, read the manual and find it there. You can also Read More

Share on:

Directory Partitions

Last edited by . Total of 7 comments in the discussion.

The Active Directory database is logically separated into directory partitions: Schema partition Configuration partition Domain partition Application partition Each partition is a unit of replication and each partition has its own replication topology. Replication occurs between directory partition replicas. Minimum two directory partitions are common among all domain controllers in the same forest: the schema and configuration partitions. Additionally, all domain controllers that are in the same domain share a common domain partition. Schema Partition Only one schema partition exists per forest. The schema partition is stored on all domain Read More

Share on:

3D Graphics

Last edited by . Total of no comments in the discussion.

3 dimensional, or 3D Graphics are a representation of an object displayed in three dimensions (length, depth and height). The creation of 3-D graphics can be divided into three phases. The first step, defines the shape of the object in a process called 3D modeling. The second step involves the placement and motion of the objects in a step called layout and animation, and the last step renders the final image of the object. 3D Modeling 3D modeling involves making the basic three-dimensional shape or wire frame of the objects. Read More

Share on:

What is Multicast Wireless?

Last edited by . Total of no comments in the discussion.

Multicast is the transfer of messages to multiple destinations simultaneously, using fewer networks. The information is delivered to each of the links only once, and copies are created when the links to the destinations split, thus creating an optimal distribution path. Multicasting reduces unnecessary packet duplication. A wireless network utilizes radio communication, unlike wired networks, which employ electrical conductors. Wireless multicasting can therefore be loosely defined as the process of multicasting over wireless networks. Multicast over wireless networks is a fundamental communication function as well as a challenging goal. The Read More

Share on:

Mosquito Ringtone

Last edited by . Total of no comments in the discussion.

This "mosquito ringtone" is the original "secret ringtone." A secret ringtone is any ringtone which is recorded above 15Khz. Most adults are unable to hear frequencies above 15Khz due to age-related hearling loss known as presbycusis. Because of this, secret ringtones such as the mosquito ringtone can usually only be heard by people up to their mid twenties. This sound was originally developed by Howard Stapleton of Compound Security Systems as a way to prevent young people from loitering around businesses. That product was named the Mosquito, because the sound Read More

Share on:

Metal in Microwave

Last edited by . Total of no comments in the discussion.

When looking at a microwave, one of the things they often times see is a metal rack in there which causes confusion. However, people have always been taught that putting metal in the microwave is incredibly dangerous and can destroy the microwave. The question that they ask, then, is: why can't I put aluminum foil, for example, into the microwave, but I can have a metal rack? The answer lies in the way the atoms of metal work and how a microwave works. A microwave heats up what is put Read More

Share on:

Trendnet Default Password

Last edited by . Total of no comments in the discussion.

Trendnet advertises itself as an Ethernet based device manufacturer, but also boasts a large collection of wireless devices as well. Trendnet routers often include dual antennas for maximum coverage, four Ethernet ports, and advanced WPA encryption. Trendnet devices tend to be small, lightweight, and stylish, allowing users to set them up and forget about them. Trendnet Default Password All Trendnet devices are equipped with a control panel that allows the user to make changes to the device’s settings and configure it to work with other computers and devices throughout his/her Read More

Share on: